In the last three decades, public key cryptography has become an indispensable component of global communication digital infrastructure. These networks support a plethora of applications that are important to our economy, our security, and our way of life, such as mobile phones, internet commerce, social networks, and cloud computing. In such a connected world, the ability of individuals, businesses and governments to communicate securely is of the utmost importance. At the moment, the quantum threat is theoretical as quantum computers that fulfill the requirements of Shor’s and Grover’s algorithms for long keys are not available, but it is evident that widely used RSA, ECDSA, ECDH, and DSA cryptosystems will need to be replaced by post-quantum cryptography (PQC). The need for addressing this problem early enough has been recognized by various relevant organizations and the National Institute of Standards and Technology (NIST) has started an effort to identify cryptographic algorithms able to withstand quantum computer attacks by 2022 — and make them available by 2024. The main objective of PQ-REACT project is to design, develop and validate a framework for a faster and smoother transition from classical to post-quantum cryptography for a wide variety of contexts and usage domains, while leveraging Europe's most powerful Quantum infrastructure (IBM Quantum Computer from Fraunhofer FOKUS). This framework will include PQC migration paths and cryptographic agility methods and will develop a portfolio of tools for validation of post quantum cryptographic systems, that will allow users to switch to post-quantum cryptography, taking under consideration their individualities and various contexts and a wide variety of real world pilots, i.e., Smart Grids, 5G and Ledgers. The project will also foster a series of open calls for SMEs and other stakeholders to bring and test their PQC algorithms and external pilots on the PQ-REACT, Quantum Computing Infrastructure.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::3ca7956efb444390fcc2eaab339926a3&type=result"></script>');
-->
</script>
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::3ca7956efb444390fcc2eaab339926a3&type=result"></script>');
-->
</script>
Cryptographic technologies and encrypted channel communications have become a standard security pre-requisite among government and industry protocols, schemes and infrastructure. Practical quantum computing, when available to cyber adversaries, will break the security of nearly all modern public-key cryptographic systems. Practical quantum computing, when available to cyber adversaries, will break the security of nearly all modern public-key cryptographic systems. Consequently, all secret symmetric keys and private asymmetric keys that are now protected using current public-key algorithms, as well as the information protected under those keys, will be subject to exposure. This includes all recorded communications and other stored information protected by those public-key algorithms, the so-called Harvest Now Decrypt Later (HNDL) paradigm. Any information still considered to be private or otherwise sensitive will be vulnerable to exposure and undetected modification. Once exploitation of Shor’s algorithm becomes practical, protecting stored keys and data will require re-encrypting them with a quantum-resistant algorithm and deleting or physically securing “old” copies (e.g., backups). Integrity and sources of information will become unreliable unless they are processed or encapsulated (e.g., re-signed or timestamped) using a mechanism that is not vulnerable to quantum computing-based attacks. PQ-NEXT will focus on developing a comprehensive framework to facilitate the seamless transition to post-quantum cryptographic standards. This includes creating a catalog of PQC algorithms, maintenance tools, and a quantum programming language with advanced features like high-performance simulation and hybrid quantum-classical optimization, ensuring crypto-agility and security against quantum threats for large-scale pilots, targeting the financial, critical infrastructure, digital identities and telco industries.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::996fb7a919887ff48d8c5ac29d3d9e99&type=result"></script>');
-->
</script>
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::996fb7a919887ff48d8c5ac29d3d9e99&type=result"></script>');
-->
</script>
The primary goal of SMAUG is to improve the underwater detection of threats in ports and their entrance routes, by means of a integrated system capable of providing data concerning threat analysis between 3 main elements: ports security infrastructure, advanced underwater detection systems and surveillance vessels. Underwater detection and location will be performed by four primary methods: i) acoustic detection, where a series of hydrophones will listen for sounds emitted by small underwater vehicles and will be processed by artificial intelligence methods, ii) rapid sonar hull scan, used to scan ships hulls and perform harbour floor scanning, iii) high resolution sonar inspection, to inspect objects in water with poor visibility and iv) collective autonomous location, where a swarm of autonomous underwater vehicles will act cooperatively. This will provide information to Artificial Intelligence modules which will improve the way detecting illicit and dangerous goods and/or of threats hidden below the water surface is currently done, taking into account sources such as Unmanned Surface Vehicle Systems, (USV), underswater remote operation vehicle (ROV), UAV (Aerial autonomous vehicle) and Port current information sources. The combination of these tools will allow SMAUG to prompt solutions capable of detecting possible threats to infrastructure or vessels, as well as identify vessels with concealed goods.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::b57d9b8def00e3a1683d4c4f35709e35&type=result"></script>');
-->
</script>
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::b57d9b8def00e3a1683d4c4f35709e35&type=result"></script>');
-->
</script>
SoBigData RI, with its tools and services, empowers researchers and innovators through a platform for the design and execution of large-scale data science and social mining experiments, open to users with diverse backgrounds, accessible on cloud (aligned with EOSC guidelines), and also exploiting supercomputing facilities. SoBigData RI will render social mining experiments more efficiently designed, adjusted, and repeatable by non-data scientists' domain experts by pushing the FAIR (Findable, Accessible, Interoperable) and FACT (Fair, Accountable, Confidential and Transparent) principles. SoBigData RI will orient resources from multiple perspectives: e-infrastructures and online services developers; big data analytics and AI; complex systems focussed on modelling social phenomena; ELSEC (Ethical, Legal, SocioEconomic and Cultural) aspects of data protection (as defined by the HLEG-AI); privacy-preserving techniques. SoBigData RI PPP will move our RI forward from the simple awareness of ethical and legal challenges in social mining to the development of concrete tools that operationalize ethics with value-sensitive design, incorporating values and norms for privacy protection, fairness, transparency, and pluralism.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::be32eead9cdc9d1d636b75101f30b0d0&type=result"></script>');
-->
</script>
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::be32eead9cdc9d1d636b75101f30b0d0&type=result"></script>');
-->
</script>